• Title/Summary/Keyword: Web technologies

Search Result 975, Processing Time 0.028 seconds

A Study on the Improvement of Green Building Certification Information System (친환경건축물 인증제도 활성화를 위한 정보시스템 개선 연구)

  • Ryu, Soo-Hoon
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.11 no.3
    • /
    • pp.5-16
    • /
    • 2011
  • This study aims for improvement and rebuilding of the 'Green Building Certification Criteria Information System;GBCCIS'. To achieve this, improved information system has developed self-assessment program available on the web and to provide data about the target of Green Building Certification based on the 2010 revised criteria. The target building of Green Building Certification is Apartment, Office, Mixed-Use Building, School, property for sale, accommodation, and other facilities. Also, the information system about the Green building related technologies and techniques to take advantage of offer a variety of information was built. Green Building Certification Criteria web-site Established in this study has information and each menu and contents are linked to organic and high-utilization. Each menu is organized according to the used frequency and the group. Also this web-site is composed of information guide field, core service field, and other field. These improvement of Green Building Certification Criteria Information System can be a positive incentive measures for the activation of Green Building Certification Criteria easily by taking advantage of relevant information by users. And these will be possible to planning development of Green building technologies by introducing the latest Green building construction techniques applicable building. Also, to assess in advance by using self-assessment program in the design phase of building will lead to Green building design and provide the convenience of the application process and through database construction and share information of building assessment resources certified Green Building Certification Criteria will lead to the containment and fair assessment between cation authorities.

Empirical Research to Understand the User Perception and Requirement of Library 2.0 (라이브러리 2.0에 대한 이용자 인식 및 요구사항에 관한 실증적 연구)

  • Lee, Jee-Yeon;Min, Ji-Yeon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.42 no.1
    • /
    • pp.213-231
    • /
    • 2008
  • In this study, we wanted to find out about the perceptions and the requirements of the academic information service users about the Library 2.0. This study used the survey research method, which utilized the web-based survey using the academic information service users as the target population. Specifically, we studied whether and how the users recognized and experienced the Web 2.0 technologies and its related services with respect to Library 2.0. In addition, we gathered the requirements for the Library 2.0 concept applied information services. The analysis results showed that the users were in need of obtaining the most up-to-date information and also using the professional information services such as the experts generated information contents and the Google Scholar type document reference information services instead of the Library 2.0 services based on the Web 2.0 technologies.

OTACUS: Parameter-Tampering Prevention Techniques using Clean URL (OTACUS: 간편URL기법을 이용한 파라미터변조 공격 방지기법)

  • Kim, Guiseok;Kim, Seungjoo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.55-64
    • /
    • 2014
  • In a Web application, you can pass without restrictions special network security devices such as IPS and F/W, URL parameter, which is an important element of communication between the client and the server, is forwarded to the Web server. Parameters are modulated by an attacker requests a URL, disclose confidential information or through e-commerce, can take financial gain. Vulnerability parameter manipulation thereof cannot be able to determine whether to operate in only determined logical application, blocked with Web Application Firewall. In this paper, I will present a technique OTACUS(One-Time Access Control URL System) to complement the shortcomings of the measures existing approaches. OTACUS can be effectively blocked the modulation of the POST or GET method parameters passed to the server by preventing the exposure of the URL to the attacker by using clean URL technique simplifies complex URL that contains the parameter. Performance test results of the actual implementation OTACUS proves that it is possible to show a stable operation of less than 3% increase in the load.

A Web Services-based Client OLAP API and Its Application to Cube Browsing (웹 서비스 기반의 클라이언트 OLAP API와 큐브 브라우징에의 응용 사례)

  • Bae, Eun-Ju;Kim, Myung
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.143-152
    • /
    • 2003
  • XML and Web Services draw a lot of attention as standard technologies for data exchange and integration among heterogeneous platforms XML/A, which supports such technologies, is a SOAP based XML APl that facilitates data exchange between a client application and a data analysis engine through the Internet. The fact that the XML format is used for data exchange makes XML/A to be platform-independent. However. client application developers have to go through a tedious Job of treating the same type of XML documents fur downloading data from the server. Also, an XML query language is needed for extracting data from the XML documents sent by the server. In this paper, we present a high level client OLAP API, called DXML, for the client application developers in the windows environment to easily use the OLAP services of XML/A. XMLMD consists of properties and methods needed for OLAP application development. XMLMD is to XML/A what ADOMD is to OLEDB for OLAP. We also present a web OLAP cube browser that is developed using XMLMD. The browser display's data in various formats such as XML, HTML, Excel, and graph.

A Study on Data Security of Web Local Storage (웹 로컬스토리지 데이터 보안을 위한 연구)

  • Kim, Ji-soo;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.55-66
    • /
    • 2016
  • A local storage of HTML5 is a Web Storage, which is stored permanently on a local computer in the form of files. The contents of the storage can be easily accessed and modified because it is stored as plaintext. Moreover, because the internet browser classifies the local storages of each domain using file names, the malicious attacker can abuse victim's local storage files by changing file names. In the paper, we propose a scheme to maintain the integrity and the confidentiality of the local storage's source domain and source device. The key idea is that the client encrypts the data stored in the local storage with cipher key, which is managed by the web server. On the step of requesting the cipher key, the web server authenticates whether the client is legal source of local storage or not. Finally, we showed that our method can detect an abnormal access to the local storage through experiments according to the proposed method.

A Distinction Technology for Harmful Web Documents by Rates (등급에 따른 웹 유해 문서 분류 기술)

  • Kim, Yong-Soo;Nam, Taek-Yong;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.859-864
    • /
    • 2006
  • The openness of the Web allows any user to access almost any type of information easily at any time and anywhere. However, with function of easy access for useful information, internet has dysfunctions of providing users with harmful contents indiscriminately. Some information, such as adult content, is not appropriate for all users, notably children. Additionally for adults, some contents included in abnormal porn sites can do ordinary people's mental health harm. In the meantime, since Internet is a worldwide open network it has a limit to regulate users providing harmful contents through each countrie's national laws or systems. Additionally it is not a desirable way of developing a certain system-specific classification technology for harmful contents, because internet users can contact with them in diverse way, for example, porn sites, harmful spams, or peer-to-peer networks, etc. Therefore, it is being emphasized to research and develop context-based core technologies for classifying harmful contents. In this paper, we propose an efficient text filter for blocking harmful texts of web documents using context-based technologies.

A Study on the Crime Investigation of Anonymity-Driven Blockchain Forensics (익명 네트워크 기반 블록체인 범죄 수사방안 연구)

  • Han, Chae-Rim;Kim, Hak-Kyong
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.45-55
    • /
    • 2023
  • With the widespread use of digital devices, anonymous communication technologies such as the dark web and deep web are becoming increasingly popular for criminal activity. Because these technologies leave little local data on the device, they are difficult to track using conventional crime investigation techniques. The United States and the United Kingdom have enacted laws and developed systems to address this issue, but South Korea has not yet taken any significant steps. This paper proposes a new blockchain-based crime investigation method that uses physical memory data analysis to track the behavior of anonymous network users. The proposed method minimizes infringement of basic rights by only collecting physical memory data from the device of the suspected user and storing the tracking information on a blockchain, which is tamper-proof and transparent. The paper evaluates the effectiveness of the proposed method using a simulation environment and finds that it can track the behavior of dark website users with a residual rate of 77.2%.

Expansion of Sensibility Area and Industrial Application in the Convergence Era - With Special Reference to Analysis of the Internet Arts of Sommerer and Mignonneau - (컨버전스시대 감성영역의 확장과 산업활용 -Sommerer와 Mignonneau의 인터넷 아트 분석을 중심으로-)

  • Kim, Hee-Young;Lee, Yong-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.12
    • /
    • pp.146-154
    • /
    • 2010
  • Recently 'convergence' and 'communication' have been keywords in many areas. Artists and engineers have begun to communicate each other through collaboration based on new technologies. One of the exemplary technologies of this era of convergence is a technology of fusing five senses used by both Internet Art and industrial technologies such as car navigation systems and the iPhone. Sommerer and Mignonneau's Internet Art $\ll$Riding the Net$\gg$,$\ll$The Living Room$\gg$, and $\ll$The Living Web$\gg$ implement the Internet and the five-sense fusion technology to translate not only sound into visual images but also tactile senses into tempo-spatial representations. Likewise, industrial technologies such as car navigation systems and the iPhone employ the five-sense fusion technology of speech recognition, which leads to the expansion of the realm of senses in technology as seen in Internet Art. As examined in this study, the development of art and technology through their convergence will open up a new dimension of digital art and culture technology industry.

Network vision of disaster prevention management for seashore reclaimed u-City (해안매립 신도시의 재해 예방관리 네트워크 비젼)

  • Ahn, Sang-Ro
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.09a
    • /
    • pp.117-129
    • /
    • 2009
  • This paper studied the safety management network system of infrastructure which constructed smart sensors, closed-circuit television(CCTV) and monitoring system. This safety management of infrastructure applied to bridge, cut slop and tunnel, embankment etc. The system applied to technologies of standardization guidelines, data acquirement technologies, data analysis and judgment technologies, system integration setup technology, and IT technologies. It was constructed safety management network system of various infrastructure to improve efficient management and operation for many infrastructure. Integrated safety management network system of infrastructure consisted of the real-time structural health monitoring system of each infrastructure, integrated control center, measured data transmission using i of tet web-based, collecting data using sf ver, early alarm system which the dangerous event of infrastructure occurred. Integrated control center consisted of conference room, control room to manage and analysis the data, server room to present the measured data and to collect the raw data. Early alarm system proposed realization of warning and response within 5 minute or less through development of sensor-based progress report and propagation automation system using the media such as MMS, VMS, EMS, FMS, SMS and web services of report and propagation. Based on this, the most effective u-Infrastructure Safety Management System is expected to be stably established at a less cost, thus making people's life more comfortable. Information obtained from such systems could be useful for maintenance or structural safety evaluation of existing structures, rapid evaluation of conditions of damaged structures after an earthquake, estimation of residual life of structures, repair and retrofitting of structures, maintenance, management or rehabilitation of historical structures.

  • PDF

How to Forecast Behavioral Effects on Mobile Advertising in the Smart Environment using the Technology Acceptance Model and Web Advertising Effect Model

  • Kim, Yong Beom;Joo, Hyung Chul;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4997-5013
    • /
    • 2016
  • This paper proposes and then verifies a model that can be used to forecast the effects of behavior on mobile advertising based on the Technology Acceptance Model (TAM) and Web Advertising Effect. The objective of this research is to probe the relationship between the cause and effect of the entertainment, informativeness, usefulness, capacity to accommodate smart-environment technologies, Hedonic Adaptation Model (HAM), etc. that mobile advertisements provide, as well as the attitudes toward advertisements in general. In order to accomplish this goal, the research was verified using Structural Equation Modeling (SEM), and the results are as follows. First, the informativeness of mobile advertising has a positive effect on the recognized ease of use. Second, the entertainment and informativeness of mobile advertising has positive effects on the recognized usefulness. Third, the recognized ease of use has a positive effect on the recognized usefulness. Fourth, the informativeness of mobile advertising causes a positive effect on smart-environment technologies. Fifth, the entertainment and informativeness of mobile advertising cause positive effects on the HAM. Sixth, smart-environment technologies cause positive effects on the HAM. Seventh, the recognized usefulness causes a positive effect on the value of mobile advertising and the intention of use. Eighth, the HAM has a positive effect on the value of mobile advertising and the general attitudes toward it. Ninth, the value of mobile advertising has a positive effect on the attitudes toward advertising. Tenth, the attitudes toward mobile advertising have a positive effect on the intention of use.